Malware Collection and Analysis

被引:11
|
作者
Paranthaman, Ramkumar [1 ]
Thuraisingham, Bhavani [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
基金
美国国家科学基金会;
关键词
Malware Collection; Malware Analysis; Big Data;
D O I
10.1109/IRI.2017.92
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the various malware datasets that we have obtained permissions to host at the University of Arizona as part of a National Science Foundation funded project. It also describes some other malware datasets that we are in the process of obtaining permissions to host at the University of Arizona. We have also discussed some preliminary work we have carried out on malware analysis using big data platforms.
引用
收藏
页码:26 / 31
页数:6
相关论文
共 50 条
  • [41] Profiling Mobile Malware behaviour through Hybrid Malware analysis Approach
    Mas'ud, Mohd Zaki
    Sahib, Shahrin
    Abdollah, Mohd Faizal
    Selamat, Siti Rahayu
    Yusof, Robiah
    Ahmad, Rabiah
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2013, : 78 - 84
  • [42] Analysis of Malware Download Sites by Focusing on Time Series Variation of Malware
    Tanaka, Yasuyuki
    Goto, Atsuhiro
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 173 - 179
  • [43] Review of iOS Malware Analysis
    Zhu Yixiang
    Zhang Kang
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 511 - 515
  • [44] An IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT)
    Huang, Hsien-De
    Lee, Chang-Shing
    Wang, Mei-Hui
    Kao, Hung-Yu
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4652 - 4657
  • [45] Fractal Methods for the Representation and Analysis of Polymorphism in Malware Fractal Methods for the Representation and Analysis of Polymorphism in Malware
    Cowen, Benn
    Shafi, Kamran
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2012,
  • [46] Analysis of malware download sites by focusing on time series variation of malware
    Tanaka, Yasuyuki
    Akiyama, Mitsuaki
    Goto, Atsuhiro
    JOURNAL OF COMPUTATIONAL SCIENCE, 2017, 22 : 301 - 313
  • [47] A malware analysis platform based on taint analysis
    Zhang, Fan
    Yang, Minghui
    Xu, Mingdi
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 22 - 25
  • [48] EMICS: E-mail based Malware Infected IP Collection System
    Lee, Taejin
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (06): : 2881 - 2894
  • [49] A Forensic Analysis of Android Malware How is Malware Written and How it Could be Detected?
    Allix, Kevin
    Jerome, Quentin
    Bissyande, Tegawende F.
    Klein, Jacques
    State, Radu
    Le Traon, Yves
    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 384 - 393
  • [50] Fast k-NN based Malware Analysis in a Massive Malware Environment
    Hwang, Jun-ho
    Kwak, Jin
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12) : 6145 - 6158